WGU C836 (C836)
Western Governors University
Page 2 out of 27 results
Sort by
-
WGU C836 Fundamentals of Information Security, Questions and answers, VERIFIED
- Exam (elaborations) • 10 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
Which cybersecurity term is defined as the potential for an attack on resource? - -Threat 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? - - 
Honeypots 
Which tool can be used to map devices on a network, along with their operating system and versions? - 
-Port Scanner 
Which web attack is a server-side attack? - -SQL injection 
An organization employs a VPN to safeguard its information. 
Which security principle is protected by a VPN? - -Data in...
-
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW, Questions and answers, 100% Accurate. VERIFIED
- Exam (elaborations) • 19 pages • 2023
- Available in package deal
-
- $15.49
- + learn more
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - -Integrity and Availability 
The Interception attack type most commonly affects which principle(s) of the CIA triad? This task 
contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H 
and alt+1 to alt+9. 
A.Integrity and Availability 
B.Confiden...
-
WGU C836 Fundamentals of Information security Terms, Questions and answers, VERIFIED. | 21 Pages
- Exam (elaborations) • 21 pages • 2023
- Available in package deal
-
- $17.49
- + learn more
Protecting information and information systems from unauthorized access, use, disclosure, disruption, 
modification, or destruction - -Information Security 
Companies that process credit card payments must comply with this set of standards - -Payment 
Card Industry Data Security Standard (PCI DSS) 
Used to keep something private or minimally known - -Confidentially 
Refers to the ability to prevent our data from being changed in an unauthorized or undesirable manner. - 
-Integrity 
Refers to the...
-
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW, Questions and answers, VERIFIED. EXAM PREDICTOR QUESTIONS | 30 Pages
- Exam (elaborations) • 30 pages • 2023
- Available in package deal
-
- $20.49
- + learn more
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - -Integrity and Availability 
The Interception attack type most commonly affects which principle(s) of the CIA triad? This task 
contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H 
and alt+1 to alt+9. 
A.Integrity and Availability 
B.Confiden...
-
WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane, Questions and answers, 100% Accurate, (Exam Questions) 50 Pages
- Exam (elaborations) • 50 pages • 2023
- Available in package deal
-
- $22.49
- + learn more
Which cybersecurity term is defined as the potential for an attack on a resource? 
A Impact 
B Vulnerability 
C Risk 
D Threat - -D 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? 
A Intrusion detection 
B Firewalls 
C Honeypots 
D Intrusion prevention - -C 
Which tool can be used to map devices on a network, along with their operating system types and 
versions? 
A Packet sniffer 
B Packet filter 
C Port scanner 
D Stateful firewall - -CWhich we...
Want to regain your expenses?
-
WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane. Questions and answers, Rated A+
- Exam (elaborations) • 50 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane. Questions and answers, Rated A+ 
 
 
Which cybersecurity term is defined as the potential for an attack on a resource? 
 
A Impact 
B Vulnerability 
C Risk 
D Threat - -D 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? 
 
A Intrusion detection 
B Firewalls 
C Honeypots 
D Intrusion prevention - -C 
 
Which tool can be used to map devices on a network, along wit...
-
WGU C836 Fundamentals of Information Security EXAM 2023 STUDY BUNDLE PACK SOLUTION (Verified Answers)
- Package deal • 8 items • 2023
-
- $30.49
- + learn more
WGU C836 Fundamentals of Information Security EXAM 2023 STUDY BUNDLE PACK SOLUTION (Verified Answers)
-
WGU C836 Fundamentals of Information security 2023 Terms
- Summary • 38 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
WGU C836 Fundamentals of Information security 2023 Terms 
WGU C836 Fundamentals of Information security 2023 Terms
-
WGU C836 Fundamentals of Information Security EXAM 2023 Questions and Answers (Verified Answers)
- Exam (elaborations) • 78 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
WGU C836 Fundamentals of Information Security EXAM 2023 Questions and Answers (Verified Answers)
-
WGU C836 Pre-assessment 2023 Questions and Answers (Verified Answers)
- Exam (elaborations) • 77 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
WGU C836 Pre-assessment 2023 Questions and Answers (Verified Answers) 
 
WGU C836 Pre-assessment 2023 Questions and Answers (Verified Answers)
How much did you already spend on Stuvia? Imagine there are plenty more of you out there paying for study notes, but this time YOU are the seller. Ka-ching! Discover all about earning on Stuvia